Glossary

Each industry has its jargon, and information security makes no exception. This page defines security-related concepts so that you can understand their meaning without reading a ten-page documentation. We will continue to update this page as new lessons will be posted.

B

Bug Bounty Program A crowdsourced security solution whereby independent ethical hackers are allowed to find and report vulnerabilities in company products or infrastructure.

H

HTTP Hypertext Transfer Protocol is the core protocol used by your browser to communicate with a web application (more specifically, with the web server). HTTP was conceived as a simple, text-based protocol; therefore, all messages exchanged between the browser and web server are in plain-text. The workflow of this protocol is fairly simple: when you click on a link, the client (usually your web browser) asks for a resource (e.g., index.html) by sending an HTTP request. The web server receives this request and issues an HTTP response with the requested data (if data exists, otherwise it returns an error).

P

Protocol A protocol is a set of rules that define how networked devices should communicate.

S

Security Freedom from danger, a threat, or a risk. In the context of information security, it refers to the risks, threats, and dangers related to computing devices such as computers, smartphones, IoT, servers, networks, but also covers the data stored on these devices.